9-1-1 DDoS via Malicious Baseband Firmware M Guri, Y Mirsky, Y Elovici IEEE European Symposium on Security and Privacy (EuroSP). IEEE, 2017 | 3 | 2017 |
9-1-1 DDoS: attacks, analysis and mitigation M Guri, Y Mirsky, Y Elovici 2017 IEEE European Symposium on Security and Privacy (EuroS&P), 218-232, 2017 | 34* | 2017 |
A linear downlink power control algorithm for wireless networks Y Mirsky, Y Haddad 2013 Wireless Telecommunications Symposium (WTS), 1-7, 2013 | 3 | 2013 |
An Encryption System for Securing Physical Signals Y Mirsky, B Fedidat, Y Haddad Security and Privacy in Communication Networks: 16th EAI International …, 2020 | | 2020 |
Anomaly detection for smartphone data streams Y Mirsky, A Shabtai, B Shapira, Y Elovici, L Rokach Pervasive and Mobile Computing 35, 83-107, 2017 | 38 | 2017 |
Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations M Guri, M Monitz, Y Mirski, Y Elovici 2015 IEEE 28th Computer Security Foundations Symposium, 276-289, 2015 | 214 | 2015 |
CHAIMELEON project: creation of a pan-European repository of health imaging data for the development of AI-powered cancer management tools L Martí Bonmatí, A Miguel, A Suárez, M Aznar, JP Beregi, L Fournier, ... Frontiers in oncology 12, 1-11, 2022 | 2 | 2022 |
CHAIMELEON project: creation of a pan-European Repository of health imaging data for the development of AI-powered cancer management tools LM Bonmatí, A Miguel, A Suárez, M Aznar, JP Beregi, L Fournier, E Neri, ... Frontiers in oncology 12, 742701, 2022 | 17 | 2022 |
Ciota: Collaborative iot anomaly detection via blockchain T Golomb, Y Mirsky, Y Elovici NDSS DISS Workshop 2018, 2018 | 119 | 2018 |
Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks R Bokobza, Y Mirsky arXiv preprint arXiv:2403.10562, 2024 | | 2024 |
CT-GAN Y Mirsky, T MAHLER, I SHELEF, Y ELOVICI GitHub, 2020 | 2 | 2020 |
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning Y Mirsky, T Mahler, I Shelef, Y Elovici USENIX Security Symposium 2019, 2019 | 244 | 2019 |
DANTE: A framework for mining and monitoring darknet traffic D Cohen, Y Mirsky, M Kamp, T Martin, Y Elovici, R Puzis, A Shabtai Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 25 | 2020 |
DDoS attacks on 9-1-1 emergency services Y Mirsky, M Guri IEEE Transactions on Dependable and Secure Computing 18 (6), 2767-2786, 2020 | 12 | 2020 |
Deepfake captcha: A method for preventing fake calls L Yasur, G Frankovits, FM Grabovski, Y Mirsky Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023 | 6 | 2023 |
DeepReflect: Discovering Malicious Functionality through Binary Reconstruction E Downing, Y Mirsky, K Park, W Lee USENIX Security Symposium, 2021 | 24 | 2021 |
Detection of malicious network activity YA Mirsky, O Brodt, A Shabtai, Y Elovici, M Nakae US Patent 11,201,882, 2021 | | 2021 |
detection_of_IoT_botnet_attacks_N_BaIoT Data Set Y Meidan, M Bohadana, Y Mathov, Y Mirsky, D Breitenbacher, A Shabtai, ... URL: https://archive. ics. uci. edu/ml/datasets …, 2018 | 5 | 2018 |
DF-Captcha: A Deepfake Captcha for Preventing Fake Calls Y Mirsky arXiv preprint arXiv:2208.08524, 2022 | 1 | 2022 |
DICOM images have been hacked! Now what BDY Mirsky, MP Ortiz, Z Glozman, L Tarbox, R Horn, SC Horii American Journal of Roentgenology 14 (4), 1-9, 2020 | 1 | 2020 |